Analysis
-
max time kernel
151s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 01:26
Behavioral task
behavioral1
Sample
ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0.exe
Resource
win7-20220901-en
General
-
Target
ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0.exe
-
Size
168KB
-
MD5
6fab44045e90ca4673c331bfd84f0ee9
-
SHA1
b9c5991228e3870266d0a7a7741734ad4f026ce5
-
SHA256
ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0
-
SHA512
05c75c864730a387646123210aeb359845c01219981d1a69958f886d9931a8e240ae1c05e3f72175549e84204e8758b789bb1ff3575da58b73c326bc2e858024
-
SSDEEP
3072:a55WhN9npi8X7+0rbaemqKKgrkF0tIjnK0LHB8BwXc4+4uFXBfOJ4lQHwmj3ypdX:a55WzZX7+0rb1mq+lIj3LHmBwXcxfXFP
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral1/files/0x000500000000b2d2-55.dat family_gh0strat behavioral1/files/0x000500000000b2d2-57.dat family_gh0strat behavioral1/files/0x00090000000126c8-58.dat family_gh0strat behavioral1/files/0x000b0000000126a6-59.dat family_gh0strat behavioral1/files/0x000b0000000126a6-60.dat family_gh0strat behavioral1/files/0x000b0000000126a6-62.dat family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2028 ywkkso.exe 860 hrlF00.tmp -
Loads dropped DLL 3 IoCs
pid Process 2028 ywkkso.exe 2028 ywkkso.exe 2028 ywkkso.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: ywkkso.exe File opened (read-only) \??\O: ywkkso.exe File opened (read-only) \??\T: ywkkso.exe File opened (read-only) \??\V: ywkkso.exe File opened (read-only) \??\X: ywkkso.exe File opened (read-only) \??\Z: ywkkso.exe File opened (read-only) \??\L: ywkkso.exe File opened (read-only) \??\K: ywkkso.exe File opened (read-only) \??\N: ywkkso.exe File opened (read-only) \??\G: ywkkso.exe File opened (read-only) \??\F: ywkkso.exe File opened (read-only) \??\H: ywkkso.exe File opened (read-only) \??\I: ywkkso.exe File opened (read-only) \??\Q: ywkkso.exe File opened (read-only) \??\R: ywkkso.exe File opened (read-only) \??\S: ywkkso.exe File opened (read-only) \??\U: ywkkso.exe File opened (read-only) \??\E: ywkkso.exe File opened (read-only) \??\Y: ywkkso.exe File opened (read-only) \??\W: ywkkso.exe File opened (read-only) \??\P: ywkkso.exe File opened (read-only) \??\J: ywkkso.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ywkkso.exe ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0.exe File opened for modification C:\Windows\SysWOW64\ywkkso.exe ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0.exe File created C:\Windows\SysWOW64\hra33.dll ywkkso.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\7-Zip\lpk.dll ywkkso.exe File opened for modification C:\Program Files\7-Zip\lpk.dll ywkkso.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 860 2028 ywkkso.exe 28 PID 2028 wrote to memory of 860 2028 ywkkso.exe 28 PID 2028 wrote to memory of 860 2028 ywkkso.exe 28 PID 2028 wrote to memory of 860 2028 ywkkso.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0.exe"C:\Users\Admin\AppData\Local\Temp\ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0.exe"1⤵
- Drops file in System32 directory
PID:1292
-
C:\Windows\SysWOW64\ywkkso.exeC:\Windows\SysWOW64\ywkkso.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\TEMP\hrlF00.tmpC:\Windows\TEMP\hrlF00.tmp2⤵
- Executes dropped EXE
PID:860
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD56fab44045e90ca4673c331bfd84f0ee9
SHA1b9c5991228e3870266d0a7a7741734ad4f026ce5
SHA256ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0
SHA51205c75c864730a387646123210aeb359845c01219981d1a69958f886d9931a8e240ae1c05e3f72175549e84204e8758b789bb1ff3575da58b73c326bc2e858024
-
Filesize
168KB
MD56fab44045e90ca4673c331bfd84f0ee9
SHA1b9c5991228e3870266d0a7a7741734ad4f026ce5
SHA256ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0
SHA51205c75c864730a387646123210aeb359845c01219981d1a69958f886d9931a8e240ae1c05e3f72175549e84204e8758b789bb1ff3575da58b73c326bc2e858024
-
Filesize
168KB
MD56fab44045e90ca4673c331bfd84f0ee9
SHA1b9c5991228e3870266d0a7a7741734ad4f026ce5
SHA256ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0
SHA51205c75c864730a387646123210aeb359845c01219981d1a69958f886d9931a8e240ae1c05e3f72175549e84204e8758b789bb1ff3575da58b73c326bc2e858024
-
Filesize
176KB
MD516d420ad185c870e0ec5c248dcc09bbf
SHA1817a79befc5f940f3dd82a75749488868929d612
SHA2563bbb2c3cc011b81c5dc0e49e94a0d1250a8c6fe54efcd1a61d478a1552da2d49
SHA512515509856a02ac468a0951fbc46724b50e7889f975242b34dd8bde56dc7a8f3d24e5a0df6a2ab3e47a82b642802f052651fbdaccc64fb399ddd20baa0136416e
-
Filesize
168KB
MD56fab44045e90ca4673c331bfd84f0ee9
SHA1b9c5991228e3870266d0a7a7741734ad4f026ce5
SHA256ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0
SHA51205c75c864730a387646123210aeb359845c01219981d1a69958f886d9931a8e240ae1c05e3f72175549e84204e8758b789bb1ff3575da58b73c326bc2e858024
-
Filesize
168KB
MD56fab44045e90ca4673c331bfd84f0ee9
SHA1b9c5991228e3870266d0a7a7741734ad4f026ce5
SHA256ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0
SHA51205c75c864730a387646123210aeb359845c01219981d1a69958f886d9931a8e240ae1c05e3f72175549e84204e8758b789bb1ff3575da58b73c326bc2e858024